Search Results - made ((((function algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
2
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
3
Database encryption for a Web-based Claims System
Published 2008“…Having noted its response times, an analysis was made in order to determine which encryption algorithms’ and Web browsers’ performances were most suited for the developed system and considered the best, which is lower and able to sustain its response times. …”
Get full text
Thesis -
4
Partial encryption of compressed images employing FPGA
Published 2005“…A secure encryption algorithm is then used to encrypt only the crucial parts, which are considerably smaller than the original image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
7
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis -
8
Integrated face detection approach for far image application
Published 2016“…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
Get full text
Get full text
Thesis -
9
Attribute-based encryption in securing big data from post-quantum perspective: A survey
Published 2022“…Additionally, existing works on quantum-resistant ABE schemes are reviewed based on their algorithms design, security and functionalities. Lastly, we summarized quantum-resistant ABE schemes’ ongoing challenges and future works.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain
Published 2020“…To counter this problem, a system has been proposed to detect the hand gesture using one of the machine learning technique which is Support Vector Machine (SVM) Algorithm. …”
Get full text
Get full text
Thesis -
12
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…Least significant bits (LSB) were used by the techniques to encrypt authentication data. By dispersing the numbered original data as far away from the original locations as feasible, the strategies made use of specific numbering systems. …”
Get full text
Get full text
Thesis -
13
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
14
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
Get full text
Get full text
Thesis -
15
-
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Combined generative adversarial network and fuzzy C-means clustering for multi-class voice disorder detection with an imbalanced dataset
Published 2020“…To explain the necessity of CGAN and IFCM, a comparison is made between the algorithm with CGAN and that without CGAN. …”
Get full text
Get full text
Article -
18
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
19
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
Get full text
Get full text
Thesis -
20
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
Get full text
Thesis
